Tuesday, February 18, 2020

Managing and Developing the Human Resources Research Paper

Managing and Developing the Human Resources - Research Paper Example Dickens (1994) contends that the business case for managing diversity offers a way to operate equal opportunities as a strategic issue, a core value linked to organisational competitiveness. In order to improve quality and remain competitive a number of organisations have started offering qualification levels required for better acceptability in the industry. For example, McDonald's has been given the authorisation to award their own qualifications equivalent to GCSEs, A levels and degrees, in subjects like fast-food restaurant management (BBC, 2008). Network Rail and Flybe are the other companies which have been granted such permission by Qualifications and Curriculum Authority (QCA), to confer degrees and diplomas for preparing the workforce for a competitive tomorrow (Woolcock and Elliott, 2008). These are some of the pointers towards the increasing realisation that acquiring and upgrading the skills is not only very important for competitive strength of the company, but it is equ ally crucial for the individual to remain relevant to the industry. This study is, therefore, an effort to analyse the HR scenario in general and how the UK is preparing the human resources for a better and competitive tomorrow. Irrespective of the nature and specialisation of the company, it can be said for sure that, 'people' form the core of its activities and therefore, the behaviour and character of these very 'people' will affect the overall character of the organisation. The performance level of this workforce depends upon the types of motivations provided by the organisation. It is therefore quite logical to say that Human Resource Management is a very crucial and an integral part of any organization.  

Monday, February 3, 2020

Network Design management (Dissertation) Literature review

Network Design management (Dissertation) - Literature review Example Theoretical framework: OSI reference model: The OSI model (operation systems interconnection) is used to distribute the internal activities of a communications system into a number of layers (Kozierok, 2005). The model distributes the communication system into seven different logical layers where each layer is designed to perform a unique function. The seven layers are given below: Layer 1: The first layer is known as the physical layer. The first layer is used to specify the physical and electrical needs of the device. The physical layer basically provides a connection between the transmission medium i.e. the communication cable and the device itself. Other than that the physical layer sets up the connection with the communicating device, terminates the communication and the conversion of digital data into analogue signals (Kozierok, 2005). Layer 2: The second layer of the OSI model is the data link layer. The data link layer is responsible for detecting any errors that occur at the first level of the device. In addition the data link layer also handles the flow control of the packets of data. The data link layer is divided into two parts the MAC (Media Access Control) layer and the LLC (Logical Link Control) layer. The MAC layer handles all the activities that allow the device to gain permission to access a network and to transmit the data packet. While the LLC layer is responsible for handling the flow control, error checking and flow control of the data packet (Kozierok, 2005). Layer 3: The third layer is called the network layer and it creates virtual paths on which the data packet is transmitted. Moreover the network layer is responsible for congestion control and addressing the packet (Kozierok, 2005). Layer 4: The fourth layer is the transport layer ensures that the entire data packet layer is transferred from the sender’s end to the receiver’s end. Layer 5: The session layer is responsible for establishing sessions between the sender†™s applications and the receiver’s application. Layer 6: The presentation layer encrypts and decrypts the message from the data packet. The application layer transforms the data into a form that the application can understand. The application layer encrypts the data in such a way that data transferred faces no compatibility issues (Kozierok, 2005). Layer 7: The application layer is the layer with which the user has the most interaction. The application layer supports all the user applications and the user’s activities. User authentication, quality of service and privacy are taken into account at this layer (Kozierok, 2005). E-governance engineering methodology: There has been a lot of work and research carried out regarding the performance measurements used within the public sector. Measuring the service quality and performance monitoring are just some of examples where significant progress has been made. However, there always has been an issue of how these factors a re to be integrated with various process of designing and development processes that are regularly used for e-governance projects (Carter et al., 1995). By adopting and implementing the correct methodology the integration of e-governance process and planning and designing services could become a possibility. There have been a